General

  • Target

    656-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a60d632bd2d76eb7fa43d4e72619735a

  • SHA1

    862d8c4c610e276bd9d6a6f61ccc98e0006239c5

  • SHA256

    36a66f21c633582316c7f1527cc8525033d67299eb22b59785bfd93fc5587877

  • SHA512

    9bb19ab7726c673600c86ae1b50cb39a6522b68b4830bdd8f94881986fb1581f8bbb1416ec51b5247696e6bec81537b25e8f55f66f360862f53070d45385bdbc

  • SSDEEP

    3072:A0tDxnL3kfWp5Z466hjOV1WxdqV7A9YbbCLm4:HtD9jbSdDgbCLm4

Score
10/10

Malware Config

Extracted

Family

redline

C2

193.233.20.13:11552

Attributes
  • auth_value

    9abfd72e5d4e9a093a3f555a36719c53

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 656-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections